10 October 2010
http://pastebin.com/7yVjiyMb
"TEAM KRYOGENIKS MEMBERS DOX
Fucking bunch of script kiddie newbs who think they're elite
Ghost Rider"
Includes "Virus" Nieves and "Null" Perras personal information
10 October 2010
Court documents on Justin Perras' hacking capabilities and imprisonment:
http://cryptome.org/0002/perras-hacknot.htm
Relevant: At the HOPE conference panel on snitches 18 July 2010, a panelist
described how to read court documents to tell that an indicted hacker, or
one released with only a warning, had been converted to a snitch for
the government. This from one of several on the panel sent to prison by a
fellow hacker's concealed testimony, a victim who had also been offered a
deal to do the same, but after refusing to accept a deal, had
a sentence maximized. At the same panel it was stated that conventional
wisdom among hackers is that 25% of them are snitches. Using these odds at
least one of the alleged Cryptome hackers is a snitch (see below) who initiated
the alleged attack (which is not likely to have happened as reported) to
entrap the others, and was surely paid a fee to do so to create disarray
and suspicion among the not yet nabbed. This is standard law enforcement,
spy and counterspy means and methods. Buy the conference video from
2600.com.
http://www.spywared.com/news/kryogeniks-gang-in-prison-for-comcast-hijack-724.html
28 September 2010
Two men of Kryogeniks gang were sentenced for 18 months in prison for Comcast.com
domain hijack. There [sic] third one, James Robert Black Jr., 21, was sentenced
in August to four month in prison and made a pact to collaborate with FBI
in trying to caught [sic] other partners in crime. Christopher Allen Lewis,
20, of Delaware and Michael Paul Nebel, 28, got 18 month sentence in prison
and ordered to pay $89,778.13 each.
http://www.digitalgangster.com/4um/showthread.php?108388-oh-shit-kyrogeniks-going-down-for-the-comcast-hacks
oh shit kyrogeniks going down for the comcast hacks
http://www.wired.com/threatlevel/2009/11/comcast-hack/
11-29-2009
[Selected excerpts on snitches]
Sinz: kryogeniks been known to snitch since me and xom got busted in 2k5
Sinz: its not that i dislike virus, its just that he's a lil xom clone in
that they both snitch when pressed.
SippieCup: definitely snitching.
SippieCup: edit: i take back my previous snitching statment "definitely
snitching" and in replace i say probably. it also could jsur be that they
are pleading guilty. this is why you dont fuck with big names like this.
they should have just edited the DNS to a server like they did and put an
ad on it then every other link go back to the IP of comcast. probably could
have gotten away with it for a couple hours before comcast noticed and comcast
would not have come down as hard as they did due to no loss in service...
still would have gone after them though
Craig: ebk snitched
Sis: [quoting] EBK slept for an hour Wednesday night; Defiant for 20 minutes.
Even as the attack was in progress, the hackers began to feel the weight
of their actions. Both say theyve been raided by law enforcement before.
I slept in my clothes, because the last time they came, I was in my
underwear with my dong hanging out and shit, says Defiant.
Rafael Nadal: Rofl are you guys real bitching about snitching? This isn't
the mafia, there's no omerta or any kind of code of honor. The homo() is
right. Actions have consequences. If they try to save themselves by making
a deal, good for them. Snitching shouldn't be a problem if you're not doing
anything illegal.
Rafael Nadal: What are you, 12? Do you understand that "snitching" only exists
if there's something to "snitch" about? Stop acting so hard. You're a white
kid living in a middle class neighborhood. You're not ghetto, you're not
gangster, and there's no code of honor on the internet.
Pad: when people willingly cooperate with law enforcement incriminating
themselves and their peers it's not only shockingly retarded it's also a
display of weakness and a lack of integrity. it has little to do with "acting
hard" as much as it has to do with common sense and a basic understanding
of the 5th amendment. people tend to bury themselves out of fear and ignorance.
and for the record i'm not a kid nor am i "middle class," punk bitch
Rafael Nadal: WHAT INTEGRITY?! What the HELL are you talking about? What
part of "actions have consequences" do you not understand? Snitching only
exists if there's something illegal going on. If you're not doing anything
wrong, nobody can snitch on you. Snitching is also a vital part of the judicial
system, as it uses the small fish to catch the big fish, nothing wrong with
that. Don't like snitching? Don't open yourself up to prosecution.
Craig: snitching is a problem in ebk's case, where he was involved in this
and went on a tell-all rampage (exposing his boiz) just to potentially save
some skin on his ass
Pad: snitching is a problem in any case i feel like i just woke up in narnia
A sends:
This is a link to an archive entitled "XgBoys" of the Society of Former Special
Agents of the FBI listserv for the years 2007 and 2008.
https://www.yousendit.com/download/WTNJWGJONEhwaFEwTVE9PQ
It is a 19 MB Zipped file of 12 large PDFs that will be available until October
22rd only.
Cryptome: This will be offered if it disappears.
Robert Paulson sends:
Defense Intelligence Agency's FOIA logs for FYs 2007-2009
http://historyanarchy.blogspot.com/2010/10/dia-foia-logs-for-fys-2007-2009.html
John Greenewald, Jr. sends:
US Intelligence Report: Iran with Capability to Strike US by 2014
A recently discovered US Intelligence Report from the Defense Intelligence
Agency (DIA) has a striking revelation Iran may have the capability
to attack the United States by 2014 with an ICBM missile. This report is
released amidst allegations that Irans nuclear program is progressing
to the point of nuclear weapon capabilities.
The document, labeled a Military Intelligence Digest with a SECRET security
marking, states that, An ICBM with a Non-Rotating Earth (NRE) range
of 10,000 kilometers would provide the Iranians with missile coverage of
Alaska but would not allow them to target CONUS [Continental United States],
owing to rotational effects of the Earth. The report goes on to state
that, Iran might have the capability to develop and produce an ICBM
that can strike the United States in the next 10 to 15 years.
The release of this report was due to a Freedom of Information Act (FOIA)
request by The Black Vault internet archive
(http://www.theblackvault.com),
a website devoted to obtaining and archiving declassified government documents
released via the FOIA, filed back in 1997.
It took the U.S. Defense Intelligence Agency (DIA) nearly 13 years for them
to process the request, which only yielded three pages of material; 85% of
which is completely blacked out. Although open to interpretation, the DIA
stated that some of the material was Not Responsive to the Request,
even though the original request asked for information pertaining to an Iranian
missile hitting the United States, and the blacked out paragraphs under the
heading, The Future of Irans Long-Range Ballistic Missile Program
(U).
Subsequent requests have been filed for the rest of the report, and another
11 documents have been forwarded to other agencies for possible declassification.
As of 13 years and four months after the initial filing of the FOIA request
by The Black Vault, those documents have not been received.
The documents released by the DIA can be downloaded at:
http://documents.theblackvault.com/documents/IranMissileUS.pdf
9 October 2010
A3 writes:
As a close and keen reader of new Cryptome docs on the website, I've found
much of interest alongside this complex world. I'm not of particularly high
IQ and some of the intrigues reported on leave me close to breathless in
terms of their complexity.
Now all this is seeming put to one side with the 'in fighting' in
Wikileaks/Cryptome. This may be understandable to chess masters or otherwise
clever people but for the likes of me it's tempting to seek the Off button
for all. If you lose all your readership save for those fully confident in
the arts of black magic, then maybe one of your goals may have been missed?
(If someone has hacked your emails does this cloud out all else? Maybe it
does for you.)
Cryptome to A3:
Thanks for your comments. We have tried to remain as distant as possible
from Wikileaks but others continue to try to link us asserting that Cryptome
and Wikileaks are similar. That is not true, the differences far outweigh
the similarities.
First and foremost we are modest, Wikileaks is not. It seeks attention, we
do not. It is eager for worldwide acclaim, We don't want that. It engages
in lurid braggardy about its value. We do not. It makes grand promises and
struts and taunts. We do not.
Our purpose and procedures are not at all the same: we do not aim to be a
new form of journalism, to be a whistleblower, to publish dramatic leaks
that nobody else does, to keep our operations secret, to brag about our
activities, to claim to be attacked by powerful forces, to doctor files and
orchestrate bombshell releases, to beg for funding and seek grants, to Twitter
endlessly only that which valorizes, to issue press releases and hold press
conferences, to promise unrealistic protection of sources, to entice with
what's coming next, indeed, all the preening and peddling tools of the public
relations industry.
That all too common product hyperbole to maximize sales is not for us.
We would prefer to avoid discussing Wikileaks. Still, email and phone calls
keep coming demanding we get on board the Wikileaks gravy train or help derail
it. By gravy train I mean all those who exploiting the Wikileaks frenzy --
pro and con -- for their own benefit.
A number of poorly-informed critics have attacked Cryptome for ostensible
opposition to Wikileaks, rather their adoring version of it. The recent alleged
hack of Cryptome and private files by avowed supporters of Wikileaks was
reported to be related to a search for anti-Wikileaks materials. This among
a number of vigilante aggressions monochromacized by Wikileaks hypnoticism
to perceive only black and white.
We have noted that Wikileaks does not make the link to Cryptome, only others
who apparently are incapable of understanding the differences.
Those who link us to Wikileaks appear to be engaged in a campaign to undermine
Cryptome and Wikileaks. We are doing our best to fight this campaign and
your help would be appreciated.
Sure we get angry and annoyed at these useless provocations. So our comments
about Wikileaks are aimed at the provokers not Wikileaks the vision deserving
fulfillment by many similar and same.
9 October 2010
Cryptome to A2:
Thanks for the advice. Train Req appears from all boxes on our LAN, some
never before logging onto Earthlink. We will look more closely as you suggest.
However, Earthlink is likely running a honey pot for its own use or for its
lawful cohorts. We have noted that on Cryptome just now.
We have previously published the virtues of using honey pots as part of security.
The Cryptome hackers are fools if they don't know this. They have been logged
from the beginning and still are. That has not yet been published but is
by way of this insecure email. Samples:
"Xyrix" Barnhill:
c-76-124-84-68.hsd1.nj.comcast.net -- "Opera/9.80 (Windows NT 6.0; U; en)
Presto/2.6.30 Version/10.62"
"Virus" Nieves:
pool-96-250-224-79.nycmny.fios.verizon.net -- "Mozilla/5.0 (Windows; U; Windows
NT 5.1; en-US) AppleWebKit/534.3 (KHTML, like Gecko) Chrome/6.0.472.63
Safari/534.3"
"Null" Perras or others using IP 69.164.221.72:
o-0.bz (aka
Kyrogeniks.org,
Poisonapple.net,
Belegit.org):
wtf.o-0.bz -- "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.10)
Gecko/20100914 Firefox/3.6.10"
To be sure, ever more interesting techniques are being used beyond the reach
of our smug delusions. The varmints never sleep, nor do our daemons.
You may know that NetSol is heavily used for its honey pot capabilities along
with the other giants such as Earthlink who never seem to provide sufficient
security except for those who pay extremely high prices for it -- IBM, Microsoft,
Oracle, on and on, all induced to do so by bountiful lawful funding.
That is known, what is less known is the honey pot use of allegedly much
more secure ISPs offering allegedly greater security than the foolish giants.
Sec "experts" chuckle: the greater the security offered the more likely snake
oil, security theater or worse, outright deception. Good money to be made
that way.
Small ISPs are very vulnerable despite what they claim. No doubt some don't
know what they are being used for. And get very indignant if challenged to
allow an independent full-bore test. Thus the urgent need for confidentiality
and secrecy across the security spectrum.
Security is bogus.
9 October 2010
Cryptome to A:
You will know that the mail address cryptome[at]earthlink.net is not secure:
Earthlink has not closed the hole made by the hackers. It is a honey pot
for several watchers.
You are being social engineered by Nieves, and he is likely doing it to others
as well.
Several sources are providing material on the alleged culprits and the three
are probing, bluffing and threatening to find out who. Pretending to know
more than they do, a technique you will recognize.
Here is Perras' attempt today:
http://cryptome.org/0002/perras-hacknot.htm
Pretending to be you, among others, is to be expected. This response pretends
to go along with it.
Robert Paulson writes:
I recently was given and have decided to post a copy of the NSA's Center
for Cryptologic History's Mission and Function statements:
http://historyanarchy.blogspot.com/2010/10/center-for-cryptologic-history-mission.html
http://www.aklagare.se/In-English/
This page on prolonged abuse of Julian Assange appeared for the first time
on 8 October 2010 despite is date of 24 September. Another example of SE
dissimulation in handling of the case.
9 October 2010. The Earthlink hack remains. Verified that nym "Train
Req" is only triggered by the Cryptome IP address.
Earthlink Hacked
http://support.earthlink.net/contact/outages.php?cat=Email&id=69599
Note "Train Req" at the top. This nym was blamed for the Cryptome hack (below)
but has denied it. It is likely Earthlink does not know it has been hacked
or is trying to hide it from customers, futilely. This page was apparently
triggered by our IP address. If you don't see it from your address, please
send a note to cryptome[at]earthlink.net, if you dare (additional security
added at this end but who knows, consider PGP - our
PK). Screenshot
8 October 2010, 7:40AM ET, first seen about 3:30AM during the email outage,
now "reolved." Hardly.
|